Dec 20, 2023The Hacker NewsBrandjacking / Cyber Threat Hands-On Review: Memcyco's Threat Intelligence Solution Website impersonation, also kno...
Category: Attack
Dec 20, 2023NewsroomCryptocurrency / Malware A new Go-based information stealer malware called JaskaGO has emerged as the latest cross-platfor...
Dec 20, 2023NewsroomFinancial Crime / Cyber Threat A six-month-long international police operation codenamed HAECHI-IV has resulted in the arr...
Dec 19, 2023NewsroomRansomware / Cybercrime The U.S. Justice Department (DoJ) has officially announced the disruption of the BlackCat ransomwa...
Dec 19, 2023NewsroomRansomware / Russian Hackers Cybersecurity researchers have shed light on the inner workings of the ransomware operation l...
Dec 19, 2023NewsroomCyber Espionage / Cyber Attack The Iranian nation-state actor known as MuddyWater has leveraged a newly discovered command...
Dec 19, 2023The Hacker NewsSoftware Security / Threat intelligence Threat actors are increasingly making use of GitHub for malicious purposes ...
Some of you have already started budgeting for 2024 and allocating funds to security areas within your organization. It is safe to say that empl...
Dec 19, 2023NewsroomMalvertising / Browser Security The malware loader known as PikaBot is being distributed as part of a malvertising campaig...
Dec 19, 2023NewsroomCryptojacking / Cyber Threat The threat actors associated with the 8220 Gang have been observed exploiting a high-severity...